Answer:
The code is given below
Explanation:
The correct syntax would be to place appropriate parenthesis.
(month==1?"jan":(month==2?"feb":(month==3?"mar":(month==4?"apr":(month==5?"may":(month==6?"jun":(month==7?"jul":(month==8?"aug":(month==9?"sep":(month==10?"oct":(month==11?"nov":"dec")))))))))));
Similarly, you can also use the following code:
String[] months = { "jan", "feb", "mar", "apr", "may", "jun", "jul", "aug", "sep", "oct", "nov", "dec" };
int month = 1;
String monthDescription = months[month - 1];
Answer:
Explanation:
With the advance in technology, smartphones, and tablets are built to meet the ever-increasing needs of users.
Smartphones are mobile phones that also have internet connectivity, they can be used to make calls and perform many tasks just like the conventional desktop. Smartphones and tablets are indeed considered computers because they also process inputs in form of commands and they produce outputs.
Smartphones and tablets are capable of handling rich content and interactivity because:
1. Wireless synchronization with other devices: Just like desktops, laptops, they can interact with other devices, and can receive and also send information doesn't matter the distance.
2. They have Internet connectivity.
3. They have strong hardware, good storage capacity.
4. They have inbuilt software and are capable of accepting other software and programs.
5. They are built with an appealing user interface.
6. Just as computers have processors, smartphones and tablets also have processors to ensure their speed at processing informations.
Answer:
TCP/IP
Explanation:
TCP/IP which stands for Transmission Control Protocol and Internet Protocol are network protocols which divide your message into smaller chunks or fragments known as network packets and sends them out onto the Internet. When the chunks arrive at the intended destination, TCP/IP on the receiving end reassembles the network packets into the original message.
TCP/IP are the main protocols used for sending data over the internet.
Answer:
C: Security
Explanation:
Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.